Then click on the Torbutton and you should see this:
-----| @ |----- |---------------------------------------------------------------------------- | New Identity Ctrl+Shift+U | Tor circuit for this site | | New Tor Circuit for this Site Ctrl+Shift+L | (--unknown--) | | --------------------------------------------| o This browser | | Security Settings... | o China (xx.xx.xx.xx) | | Tor Network Settings... | o Russia (xx.xx.xx.xx) | | --------------------------------------------| o North Korea (xx.xx.xx.xx) | | Check for Tor Browser Update... | o Internet | | | | -----------------------------------------------------------------------------
The relevant part is Tor circuit for this site (--unknown--). Meaning that it can't decipher amazonaws.com it seems...
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Child items ...
Show closed items
Linked items 0
Link issues together to show that they're related.
Learn more.
If you go to https://www.overleaf.com/docs/12882290qmcxzryvtwqn/atts/69956807 it will redirect you to a link with https://writelatex.s3.amazonaws.com/... and if you open the Torbutton you'll see: Tor circuit for this site (writelatex.s3.amazonaws.com)
Fun, fun, this is a regression from 7.0. I wonder whether the Mozilla logic we are using now for FPI has a bug here.
Trac: Keywords: N/Adeleted, TorBrowserTeam201712, tbb-regression, GeorgKoppen201712, tbb-linkability added Severity: Normal to Major Priority: Medium to High
Firefox computes the firstPartyDomain with Services.eTLD.getBaseDomainFromHost('s3.amazonaws.com'), and that one throws an error with top-level domains (like s3.amazonaws.com) as defined in mozilla public suffix list https://publicsuffix.org/list/. And I assume if there's an exception then it gets set to an empty string (unless it's about:*, etc.).
Shouldn't firstPartyDomain be the first-level domain on those cases (instead of empty string), or am I missing some reason why this is not a good idea?
Firefox computes the firstPartyDomain with Services.eTLD.getBaseDomainFromHost('s3.amazonaws.com'), and that one throws an error with top-level domains (like s3.amazonaws.com) as defined in mozilla public suffix list https://publicsuffix.org/list/. And I assume if there's an exception then it gets set to an empty string (unless it's about:*, etc.).
Shouldn't firstPartyDomain be the first-level domain on those cases (instead of empty string), or am I missing some reason why this is not a good idea?
Interesting. My intuition goes with you here and I'd assume that's a bug. Could you file a bug at Mozilla's bug tracker blocking https://bugzilla.mozilla.org/show_bug.cgi?id=1299996? We could ask :ethan to help us finding someone at Mozilla who'd have an opinion about that.
Meanwhile, feel free to work on a patch implementing your suggestion. We should take it for Tor Browser at least.
Not sure if we should wait for more feedback on https://bugzilla.mozilla.org/show_bug.cgi?id=1542309. Implemented dveditz first suggestion, the alternative I see is to try to fix it just on torbutton by looking at the special case when firstPartyOrigin is empty, and try to get it from somewhere else (nsiChannel.loadInfo.loadingPrincipal?)
Not sure if we should wait for more feedback on https://bugzilla.mozilla.org/show_bug.cgi?id=1542309. Implemented dveditz first suggestion, the alternative I see is to try to fix it just on torbutton by looking at the special case when firstPartyOrigin is empty, and try to get it from somewhere else (nsiChannel.loadInfo.loadingPrincipal?)
I think that approach is good and we should get the fix into Firefox as Mozilla's users are affected by this problem as well.
Regarding your patch: why did you deal with the insufficient domain level case in the code block that is concerned with the scheme of the URL? It seems it does not fit there. What about having a special block before that one like the ip address error one. It could start with
if (rv == NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS) { followed by the remainder of your patch. Or maybe you use the ip address error block and do a else if (rv == NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS) { treating both error cases together. That might even be better.
It was to make sure the special cases about: and blob: are still handled like before. If I'm not wrong, the error on those cases would still be NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS (empty host). So the condition needs to be if (rv == NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS && !scheme.EqualsLiteral("about") && !scheme.EqualsLiteral("blob").
It was to make sure the special cases about: and blob: are still handled like before. If I'm not wrong, the error on those cases would still be NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS (empty host). So the condition needs to be if (rv == NS_ERROR_INSUFFICIENT_DOMAIN_LEVELS && !scheme.EqualsLiteral("about") && !scheme.EqualsLiteral("blob").
Right. I am still not overly happy to mix this new check with scheme related ones. What about returning both in the about if-clause and in the blob elseif-clause after the checks are done and then having an insufficient_domain_levels check in an own block afterwards in case the code still has not returned? Oh, and adding a comment above the isInsufficientDomainLevels declaration would be good about why we have this one at that place at all.
I guess before we overengineer that on our side it might be worth getting this to review for Mozilla folks (I wanted to point you to try builds etc. after we have a reasonable Tor Browser patch, but it seems tjr has jumped the gun ;). So, in case tjr's try build looks good, could you request review on the Moz bug and then we'd basically take what Mozilla is happy with? Or you could post a revised patch based on my comments above (if they make sense to you) to the ticket and request review. Up to you.